March 13, 2023 Securing Your Home Network Our devices are connected to the Internet 24/7 and the only thing separating them from the bad guys is usually your home router. In…
December 12, 2022 We Are the Cavalry Today when computer systems fail, they can cause real, physical harm. In just the last few years, we’ve seen cyber attacks interfere with our…
September 26, 2022 iOS 16 Security & Privacy Features Apple just released a major update to its iPhone operating system, iOS 16. This release has some really important security and privacy features, including…
August 22, 2022 Hacker Summer Camp 2022 If it’s August in Las Vegas, it’s time for Hacker Summer Camp. There are three hacker conferences that coordinate to happen next to each…
May 16, 2022 Global Privacy Control When we surf the web today – on our computers or smartphones – we are mercilessly tracked. Marketing firms and data brokers are hoovering…
April 11, 2022 Luck Favors the Prepared Today, most of us take the internet – and access to the internet – for granted. It’s ubiquitous. However, the current war in Ukraine…
March 14, 2022 Computer Security Goes Microscopic We didn’t use to think too much about physical computer security because most computers were safely stored in our homes or businesses. But many…
February 28, 2022 Securing Your Mobile Device Your cell phone is a super computer and phenomenally powerful tracking device. Even George Orwell wouldn’t have dreamed that telescreens would be pocket sized…
January 10, 2022 2022 New Year’s Resolutions It’s the start of a brand new calendar year! And therefore it’s time to engage in that annual ritual of planning to do better…
December 20, 2021 The Log4Shell Debacle The internet is on fire this week. The worst cybersecurity vulnerability of the last ten years (and perhaps more) has kicked the internet ant…